Thank you very much, Mr. Chair for inviting me and my colleagues to appear before you again regarding the question of privilege related to cyber-attacks targeting members of Parliament.
Members will recall that we previously appeared on June 4 of this year. We trust that our testimony will assist the committee in its study.
After the Standing Committee on Procedure and House Affairs ordered the provision of documents from the House of Commons Administration and government institutions in May 2024, and following the appearance of administration representatives before this very committee on June 4, 2024, the House Administration gathered the documents in its possession to respond to the order to provide documents.
In reviewing these records, the House administration found that most of the documents relevant to this order were email exchanges from the Canadian Centre for Cyber Security, or CCCS, which is part of the Communications Security Establishment Canada, or CSE.
After some discussion, the House Administration has provided CSE with documents from the CCCS in both official languages. CSE has committed to providing them directly to the Standing Committee on Procedure and House Affairs, with the redactions requested by the committee. CSE was in a better position to redact its information in accordance with the committee's order for the production of documents.
To ensure that all documents were disclosed to PROC, the House administration reviewed the documents produced by CSE and identified three documents that CSE had yet to disclose to PROC. Those were sent directly to you last week by the House administration. I note that we worked with CSE to make the redactions requested by the committee.
The House administration also identified two internal documents responsive to the order, which we provided to PROC on August 9. Those consist of an internal report and an email exchange between the House administration's IT security branch and various senators and members of Parliament, in both official languages. Redactions to the documents were made as requested by the committee to protect personal information, to protect information on the vulnerability of the House of Commons computer communications systems and methods employed to protect those systems, and information that would be injurious to the detection, prevention or suppression of subversive or hostile activities.
That concludes our opening remarks.
We look forward to your questions.